
Online or onsite, instructor-led live BCS training courses.
BCS certified training courses are available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live BCS training can be carried out locally on customer premises in the UK or in NobleProg corporate training centres in the UK.
NobleProg -- Your Local Training Provider
Testimonials
Knowledge of the trainer was excellent and delivered in an engaging manner
Richard Brown - KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Not very much, it felt like the course was crammed into 3 days. This is not the trainers fault, but this course should have been over 4 or 5 days. Too much information to take in and to understand prior to taking an exam in the subject
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Great to have qualification as gives me the recognition of my work
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Trainer Knowledge - Thought his general knowledge on the subject was impressive.
Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel was very engaging with our group. The examples he used to make the material more relatable was extremely helpful
Erica McBride - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel's mastery of the subject and his anecdotes (where they fitted into the subject matter) were great
Kevin Lazell - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Trainer used industry experience which brought the programmeme to live
Christian Eduwa - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Trainer's interaction to each individual, using whiteboard instead of going through slides, interactive team session, well-structured, adequate breaks, very much enjoyed going through exam question results and overall updates at end of each day with open forum discussion.
Maureen Barker - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Abhi is a great trainer and his experience adds to the delivery. If any other of my colleagues are to attend the course, I would want the trainer to be Abhi. The workshops to help those on the course that Abhi added off his own back, helped to solidify the learning.
Yusuf Bhayat - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
BCS Course Outlines
- The function of and need for business continuity management within an organisation
- The business continuity management life cycle
- The main components of a business continuity management programme
- The need for risk assessment within business continuity management
- The options for development of a business continuity management strategy
- How to prepare and develop plans for business continuity management response
- The need for exercising, maintenance and review of plans
- The need for embedding business continuity management awareness within the organisation
- System Administrators who wish to become security architects
- Technical architects looking to move into the field of security architecture
- Describe the business environment and the information risks that apply to the systems.
- Describe and apply security design principles.
- Identify information risks that arise from potential solution architectures.
- Design alternate architectures or countermeasures to mitigate identified information risks.
- Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
- Apply ‘standard’ security techniques and architectures to mitigate security risks.
- Develop new architectures that mitigate the risks posed by new technologies and business practices.
- Provide consultancy and advice to explain Information Assurance and architectural problems.
- Security configure ICT systems in compliance with their approved security architectures.
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
- Origins
- Benefits
- Culture and teams
- Automation
- Lean
- Measurement
- Sharing
- Common roles
- Practices and techniques
- Methods and approaches for teams
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- Hold a recognised qualification in data protection.
- Gain an understanding of the key changes that the GDPR and the Data Protection Act (2018) bring to data protection.
- Gain an understanding of the new rights available to data subjects and the implications of those rights with the GDPR and Data Protection Act (2018).
- Gain an understanding of individual and organisational responsibilities under the GDPR and the Data Protection Act (2018), particularly the need for effectiveness record keeping.
- Gain an understanding of the increased obligations faced by data controllers and data processors as a result of the GDPR coming into force and the Data Protection Act (2018) being enacted.
- Be better placed to support their organisation in processing customer data in compliance with the GDPR and the Data Protection Act (2018).
- Anyone who has some existing responsibility for data protection within their organisation.
- It’s also useful for those who want to broaden their basic understanding in this area and fully understand the practical applications of data protection laws.
- Whilst this certificate is written to the UK Data Protection Act, many other jurisdictions have enacted broadly similar data protection laws, so international candidates may also find this useful.
- Gain an understanding of the key changes and the associated implications that the GDPR and the UK Data Protection Act 2018 introduce to data protection.
- Gain an understanding of individual and organisational responsibilities under the GDPR and the UK Data Protection Act, particularly the need for effective record keeping.
- Be able to apply the new rights available to data subjects and understand the implications of those rights.
- Be able to demonstrate an understanding of the designation, position and role / tasks of a data protection officer.
- Be able to prepare organisations to manage and handle personal data in compliance with the GDPR and the UK Data Protection Act.
Last Updated: